If we set out to watch a sunset, we know we have to wait for sundown. We certainly know we cannot rush it, so we relax and wait. We know patience is in the game plan. However, when it comes to WiFi, or more specifically, WLAN (Wireless Local Area Networks),…

If You Are Not Using Advanced Persistent Threat Detection, You’re Playing Malware Checkers While They’re Playing Malware Chess. Today’s attacks are persistent and sophisticated. The typical threat detection, identification, and containment strategy is a five step process. This traditional 5-step strategy is effective against known malware, recognizable…

Apex engineered networks rely on multiple layers of security to protect the critical data and systems that make up our customer networks. The different threat entry points, known as threat vectors, that the Wannacry virus uses are protected by different technologies. Each technology makes up layers in a multi-tiered approach…

If you use Facebook, you may have already seen this scam in your Messenger inbox recently: a friend sends you a message with your first name and a link to a YouTube video that appears to be a video all about… you. It even has your first and last name…

Change your Yahoo password NOW. While investigating the August 2014 security breach that affected 500 million users, Yahoo discovered a far bigger breach that compromised more than 1 billion user accounts, all the way back in 2013. User outrage is not unfounded. According to former members of Yahoo’s…

Sometimes, free Wi-Fi seems like a no-brainer. But how careful are you when connecting to an unfamiliar Wi-Fi network? “Free” Wi-Fi isn’t always without a price – all too often, you’re leaving your mobile device vulnerable to hacking. Recently at the Republican National Convention, network security company Avast set up…